lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <002301cd4f64$17a055c0$46e10140$@net>
Date:	Wed, 20 Jun 2012 21:12:28 -0700
From:	"Doug Smythies" <dsmythies@...us.net>
To:	"'Peter Zijlstra'" <peterz@...radead.org>
Cc:	"'Yong Zhang'" <yong.zhang0@...il.com>,
	"'Charles Wang'" <muming.wq@...il.com>,
	<linux-kernel@...r.kernel.org>, "'Ingo Molnar'" <mingo@...hat.com>,
	"'Tao Ma'" <tm@....ma>,
	'含黛' <handai.szj@...bao.com>,
	"'Thomas Gleixner'" <tglx@...utronix.de>,
	"Doug Smythies" <dsmythies@...us.net>
Subject: RE: [PATCH] sched: Folding nohz load accounting more accurate


>> On Tue, 2012-06-19 at 08:50 -0700, Doug Smythies wrote:
>  On 2012.06.20 02:45 -0700, Peter Zijlstra wrote:

>> My automated 63 hour test has been terminated, the code changed
>> and the test re-started. 

> There's another boo-boo in there:

O.K. I let the automated test finish the 3 processes stuff
(which is 1/2 way).
The newly compiled code is now running, but I only resumed
the test, I did not re-start it.

A comparative graph of the 1 & 2 process results is attached.
(the previous version of this same graph was on another thread).
Legend:
Control: older kernel compiled with CONFIG_NO_HZ=no
c308: Kernel with the earlier commit
5aaa: Basically, Kernel 3.5 RC2
Wang: Charles Wang's first proposed solution.
Peter35: Peter Zijlstra's current proposed solution.

Summary: Extremely good.


Download attachment "peter_compare.png" of type "image/png" (90553 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ